• Source: Scopus
20162019

Content available in repository

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2018

    HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

    Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    10 Citations (Scopus)
    2 Downloads (Pure)
  • Post-quantum security of the sponge construction

    Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    11 Citations (Scopus)
  • “Oops, I did it again” – Security of one-time signatures under two-message attacks

    Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • 2017

    Sliding right into disaster : left-to-right sliding windows leak

    Bernstein, D. J., Breitner, J., Genkin, D., Groot Bruinderink, L., Heninger, N., Lange, T., van Vredendaal, C. & Yarom, Y., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Homma, N. & Fischer, W. (eds.). Dordrecht: Springer, p. 555-576 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10529 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    22 Citations (Scopus)
  • To BLISS-B or not to be : attacking strong Swan's implementation of post-quantum signatures

    Pessl, P., Groot Bruinderink, L. & Yarom, Y., 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Thuraisingham, B. M., Evans, D., Malkin, T. & Xu, D. (eds.). New York: Association for Computing Machinery, Inc, p. 1843-1855 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    29 Citations (Scopus)
    109 Downloads (Pure)
  • 2016

    Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

    Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    85 Citations (Scopus)